Search results for: Yasser Atta Shehata
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 116

Search results for: Yasser Atta Shehata

116 CAG Repeat Polymorphism of Androgen Receptor and Female Sexual Functions in Egyptian Female Population

Authors: Azza Gaber Farag, Yasser Atta Shehata, Sara Elsayed Elghazouly, Mustafa Elsayed Elshaib, Nesreen Gamal Elden Elhelbawy

Abstract:

Background: Androgen receptor (AR) polymorphism in cytosine adenineguanine (CAG) repeat has an effect on the functional capacity of AR in males. However, little researches in this field are available regarding female sexual function. Aim: To investigate the possible link between polymorphism in the CAG repeat of AR gene and female sexual function in a sample of the Egyptian population. Materials and methods: 500 Egyptian married females completed a questionnaire regarding sociodemographic, reproductive, and sexual data. AR CAG repeat length was analyzed for those having female sexual dysfunctions (FSD) using real-time PCR. Results: The most sensitive domain to AR CAG repeat length was the orgasm domain that showed significant positive correlations with short allele (p=0.001), long allele (p=.015), biallellic mean (p=.000), and X weighted biallelic mean (p=.000). The satisfaction domain had significant positive correlations with the biallelic mean (p=.035), and the X weighted biallelic mean (p=. 032). However, the pain domain was of significant negative correlations with AR polymorphism of short allele (p=.002), biallelic mean (p=.013), and X weighted biallelic mean (p = . 011). Conclusions: AR polymorphism could represent a non-negligible aspect in female sexual function. The lower AR CAG repeat polymorphism was of significant impact on FSD, affecting mainly female orgasm followed by pain disorders that finally reflected On her sexual satisfaction.

Keywords: female sexual dysfunction, androgen receptor, CAG repeat polymorphism, androgen

Procedia PDF Downloads 143
115 WSN System Warns Atta Cephalotes Climbing in Mango Fruit Trees

Authors: Federico Hahn Schlam, Fermín Martínez Solís

Abstract:

Leaf-cutting ants (Atta cephalotes) forage from mango tree leaves and flowers to feed their colony. Farmers find it difficult to control ants due to the great quantity of trees grown in commercial orchards. In this article, IoT can support farmers for ant detection in real time, as production losses can be considered of 324 US per tree.A wireless sensor network, WSN, was developed to warn the farmer from ant presence in trees during a night. Mango trees were gathered into groups of 9 trees, where the central tree holds the master microcontroller, and the other eight trees presented slave microcontrollers (nodes). At each node, anemitter diode-photodiode unitdetects ants climbing up. A capacitor is chargedand discharged after being sampled every ten minutes. The system usesBLE (Bluetooth Low Energy) to communicate between the master microcontroller by BLE.When ants were detected the number of the tree was transmitted via LoRa from the masterto the producer smartphone to warn him. In this paper, BLE, LoRa, and energy consumption were studied under variable vegetation in the orchard. During 2018, 19 trees were attacked by ants, and ants fed 26.3% of flowers and 73.7% of leaves.

Keywords: BLE, atta cephalotes, LoRa, WSN-smartphone, energy consumption

Procedia PDF Downloads 125
114 Anatta: A Buddhist Remedy to the Problem of Associating Eternal Self to Non-Eternal Body

Authors: Maitreyee Datta

Abstract:

In Anātmalaksana Sutra, Buddha talks about the importance of anattā (no-self). This notion of no-self is a critical response towards the Brahmanical tradition of classical India in which self has been taken to be eternal. Though self is taken to be eternal, ‘I’ refer to Person who is the self as determined by non-eternal body. Buddha raises questions regarding the possibility of the association between eternal self and non-eternal body. According to him, such an association is not possible. Thus, instead of an eternal self and its association with the non-eternal body, he speaks about association among five different non-eternal parts (skandhas). He holds that ‘I’ refers to Person, but this Person is not eternal self as determined by the non-eternal body. It is the combination of five different skandhas each of which is non-eternal. So according to Buddha, there is no eternal self which in association with non-eternal body is referred to as ‘I,’ but ‘I’ is a convenient designator which designates the combination of five non-eternal skandhas. If ‘I’ is taken to refer the combination of five non-eternal skandhas, then the problematic of the association between eternal self (attā) and non-eternal body will not be there. The realization that ‘I’ does not refer to any eternal self as determined by non-eternal body, but instead refer to the combination of five non-eternal skandhas leads to the cessation of suffering (duhkkha). The root of suffering lies in craving for something or the other. Thus, as soon as one realizes that the person is not constituted of any eternal self but is constituted of non-eternal skandhas, his desire to acquire and possess will be stopped. Thus, in the whole conceptual framework of Buddhist philosophy, anattā occupies a pivotal role the realization of which is admitted to be the cause of the cessation of suffering. In the present paper, an effort will be made to analyse this notion of anattā to show how the realization of the truth that person is a combination of five skandhas each of which is non-eternal helps an individual to get rid of the bondage. If eternal self is to be admitted, then there always remains the problem of connecting the eternal self with the non-eternal body, because this connection only gives rise to the notion of person in such framework.

Keywords: anatta, atta, duhkkha, skandha

Procedia PDF Downloads 105
113 FPGA Implementation of RSA Encryption Algorithm for E-Passport Application

Authors: Khaled Shehata, Hanady Hussien, Sara Yehia

Abstract:

Securing the data stored on E-passport is a very important issue. RSA encryption algorithm is suitable for such application with low data size. In this paper the design and implementation of 1024 bit-key RSA encryption and decryption module on an FPGA is presented. The module is verified through comparing the result with that obtained from MATLAB tools. The design runs at a frequency of 36.3 MHz on Virtex-5 Xilinx FPGA. The key size is designed to be 1024-bit to achieve high security for the passport information. The whole design is achieved through VHDL design entry which makes it a portable design and can be directed to any hardware platform.

Keywords: RSA, VHDL, FPGA, modular multiplication, modular exponential

Procedia PDF Downloads 348
112 Experimental Characterization of Fatigue Crack Initiation of AA320 Alloy under Combined Thermal Cycling (CTC) and Mechanical Loading (ML) during Four Point Rotating and Bending Fatigue Testing Machine

Authors: Rana Atta Ur Rahman, Daniel Juhre

Abstract:

Initiation of crack during fatigue of casting alloys are noticed mainly on the basis of experimental results. Crack initiation and strength of fatigue of AA320 are summarized here. Load sequence effect is applied to notify initiation phase life. Crack initiation at notch root and fatigue life is calculated under single & two-step mechanical loading (ML) with and without combined thermal cycling (CTC). An Experimental setup is proposed to create the working temperature as per alloy applications. S-N curves are plotted, and a comparison is made between crack initiation leading to failure under different ML with & without thermal loading (TL).

Keywords: fatigue, initiation, SN curve, alloy

Procedia PDF Downloads 373
111 Investigation of the Aerodynamic Characteristics of a Vertical Take-Off and Landing Mini Unmanned Aerial Vehicle Configuration

Authors: Amir Abdelqodus, Mario Shehata

Abstract:

The purpose of the paper is to model and evaluate the aerodynamic coefficients and stability derivatives of a Vertical, Take-off and Landing Unmanned Aerial Vehicle configuration (VTOL UAV), which is a fixed wing UAV and a quad-copter hybrid capable of both vertical and conventional take-off and/or landing. The aerodynamic analysis of this configuration was carried out using CFD commercial package Ansys Fluent. Also, the aerodynamic coefficients for the case of the UAV without the quad-copter is carried out analytically using MATLAB programmed codes, and the resulting data is verified using Lifting Line Theory and potential method programs. The two results are then compared to understand the effect of adding the quad-copter on the aerodynamic performance of the UAV.

Keywords: aerodynamics, CFD, potential flow, UAV, VTOL

Procedia PDF Downloads 403
110 Cellular Automata Using Fractional Integral Model

Authors: Yasser F. Hassan

Abstract:

In this paper, a proposed model of cellular automata is studied by means of fractional integral function. A cellular automaton is a decentralized computing model providing an excellent platform for performing complex computation with the help of only local information. The paper discusses how using fractional integral function for representing cellular automata memory or state. The architecture of computing and learning model will be given and the results of calibrating of approach are also given.

Keywords: fractional integral, cellular automata, memory, learning

Procedia PDF Downloads 377
109 RANS Simulation of the LNG Ship Squat in Shallow Water

Authors: Mehdi Nakisa, Adi Maimun, Yasser M. Ahmed, Fatemeh Behrouzi

Abstract:

Squat is the reduction in under-keel clearance between a vessel at-rest and underway due to the increased flow of water past the moving body. The forward motion of the ship induces a relative velocity between the ship and the surrounding water that causes a water level depression in which the ship sinks. The problem of ship squat is one among the crucial factors affecting the navigation of ships in restricted waters. This article investigates the LNG ship squat, its effects on flow streamlines around the ship hull and ship behavior and motion using computational fluid dynamics which is applied by Ansys-Fluent.

Keywords: ship squat, CFD, confined, mechanic

Procedia PDF Downloads 582
108 A Design of Beam-Steerable Antenna Array for Use in Future Mobile Handsets

Authors: Naser Ojaroudi Parchin, Atta Ullah, Haleh Jahanbakhsh Basherlou, Raed A. Abd-Alhameed, Peter S. Excell

Abstract:

A design of beam-steerable antenna array for the future cellular communication (5G) is presented. The proposed design contains eight elements of compact end-fire antennas arranged on the top edge of smartphone printed circuit board (PCB). Configuration of the antenna element consists of the conductive patterns on the top and bottom copper foil layers and a substrate layer with a via-hole. The simulated results including input-impedance and also fundamental radiation properties have been presented and discussed. The impedance bandwidth (S11 ≤ -10 dB) of the antenna spans from 17.5 to 21 GHz (more than 3 GHz bandwidth) with a resonance at 19 GHz. The antenna exhibits end-fire (directional) radiation beams with wide-angle scanning property and could be used for the future 5G beam-forming. Furthermore, the characteristics of the array design in the vicinity of user-hand are studied.

Keywords: beam-steering, end-fire radiation mode, mobile-phone antenna, phased array

Procedia PDF Downloads 121
107 Experimental and Numerical Investigation of Fluid Flow inside Concentric Heat Exchanger Using Different Inlet Geometry Configurations

Authors: Mohamed M. Abo Elazm, Ali I. Shehata, Mohamed M. Khairat Dawood

Abstract:

A computational fluid dynamics (CFD) program FLUENT has been used to predict the fluid flow and heat transfer distribution within concentric heat exchangers. The effect of inlet inclination angle has been investigated with Reynolds number range (3000 – 4000) and Pr=0.71. The heat exchanger is fabricated from copper concentric inner tube with a length of 750 mm. The effects of hot to cold inlet flow rate ratio (MH/MC), Reynolds's number and of inlet inclination angle of 30°, 45°, 60° and 90° are considered. The results showed that the numerical prediction shows a good agreement with experimental measurement. The results present an efficient design of concentric tube heat exchanger to enhance the heat transfer by increasing the swirling effect.

Keywords: heat transfer, swirling effect, CFD, inclination angle, concentric tube heat exchange

Procedia PDF Downloads 283
106 Synthesis, Characterization, and Evaluation of New Series of Oil Sorbers Based on Maleate Esters

Authors: Nora A. Hamad, Ayman M. Atta, Adel A. H. Abdel-Rahman

Abstract:

Two malice anhydride esters were prepared using long chain aliphatic alcohols (C8H17OH and C12H25OH, 1:1 mole ratio). Three series of crosslinked homo and copolymers of maleate esters with octadecyl acrylate and acrylic acid were prepared respectively through suspension copolymerization. The monomers were mixed with 0.02 Wt% of BP initiator, PVA 1% (170 ml for each 100g of monomers) and different weight ratios of DVB crosslinked (1% and 4%) in cyclohexane. The prepared crosslinked homo and copolymers were characterized by SEM, TGA and FTIR spectroscopic analyses. The prepared polymers were coated onto poly (ethylene terephethalate) nonwoven fiber (NWPET). The effect of copolymerization feed composition, crosslinker wt% and reaction media or solvent on swelling properties of crosslinked polymers were studied through the oil absorption tests in toluene and 10% of diluted crude oil with toluene.

Keywords: acrylic acid, crosslinked copolymers, maleate ester, poly(ethylene terephethalate) nonwoven fiber (NWPET), oil absorbency, octadecyl acrylat

Procedia PDF Downloads 361
105 The Effect of Artificial Intelligence on Construction Development

Authors: Shady Gamal Aziz Shehata

Abstract:

Difficulty in defining construction quality arises due to perception based on the nature and requirements of the market, the different partners themselves and the results they want. Quantitative research was used in this constructivist research. A case-based study was conducted to assess the structures of positive attitudes and expectations in the context of quality improvement. A survey based on expert opinions was analyzed among construction organizations/companies operating in the construction industry in Pakistan. The financial strength, management structure and construction experience of the construction companies formed the basis of their selection. A good concept is visible at the project level and is seen as the most valuable part of the construction project. Each quality improvement technique was expected to increase the user's profits by improving the efficiency of the construction project. The Survey is useful for construction professionals to evaluate current construction concepts and expectations for the application of quality improvement techniques in construction projects.

Keywords: correlation analysis, lean construction tools, lean construction, logistic regression analysis, risk management, safety construction quality, expectation, improvement, perception

Procedia PDF Downloads 12
104 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 117
103 Effects of Unfamiliar Orthography on the Lexical Encoding of Novel Phonological Features

Authors: Asmaa Shehata

Abstract:

Prior research indicates that second language (L2) learners encounter difficulty in the distinguishing novel L2 contrasting sounds that are not contrastive in their native languages. L2 orthographic information, however, is found to play a positive role in the acquisition of non-native phoneme contrasts. While most studies have mainly involved a familiar written script (i.e., the Roman script), the influence of a foreign, unfamiliar script is still unknown. Therefore, the present study asks: Does unfamiliar L2 script play a role in creating distinct phonological representations of novel contrasting phonemes? It is predicted that subjects’ performance in the unfamiliar orthography group will outperform their counterparts’ performance in the control group. Thus, training that entails orthographic inputs can yield a significant improvement in L2 adult learners’ identification and lexical encoding of novel L2 consonant contrasts. Results are discussed in terms of their implications for the type of input introduced to L2 learners to improve their language learning.

Keywords: Arabic, consonant contrasts, foreign script, lexical encoding, orthography, word learning

Procedia PDF Downloads 224
102 Directivity and Gain Improvement for Microstrip Array Antenna with Directors

Authors: Hassan M. Elkamchouchi, Samy H. Darwish, Yasser H. Elkamchouchi, M. E. Morsy

Abstract:

Methodology is suggested to design a linear rectangular microstrip array antenna based on Yagi antenna theory. The antenna with different directors' lengths as parasitic elements were designed, simulated, and analyzed using HFSS. The calculus and results illustrate the effectiveness of using specific parasitic elements to improve the directivity and gain for microstrip array antenna. The results have shown that the suggested methodology has the potential to be applied for improving the antenna performance. Maximum radiation intensity (Umax) of the order of 0.47w/st was recorded, directivity of 6.58dB, and gain better than 6.07dB are readily achievable for the antenna that working.

Keywords: directivity, director, microstrip antenna, gain improvment

Procedia PDF Downloads 426
101 Solvent Dependent Triazole-Appended Glucofuranose-Based Fluorometric Sensor for Detection of Au³⁺ Ions

Authors: Samiul Islam Hazarika, Domngam Boje, Ananta Kumar Atta

Abstract:

It is well familiar that solvents play a significant role in modern chemistry. Solvents can change the reactivity and physicochemical properties of molecules in a solution. Keeping this in mind, we have designed and synthesized a mono-triazolyl-linked pyrenyl-appended xylofuranose derivative for the detection of metal ions with changing solvent systems. The incorporation of a sugar backbone in the sensor increases the water solubility and biocompatibility. The experimental study revealed that the xylofuranose-based fluorescence probe did not exhibit any specific selectivity towards metal ions in acetonitrile (CH₃CN) solvent. Whereas, we revealed that triazole-linked pyrenyl-appended xylofuranose-based fluorescent sensor would exhibit high selectivity and sensitivity towards Au³⁺ ions in CH₃CN-H₂O (1/1, v/v) system. This observation might be explained by the viscosity and polarity differences of CH₃CN and CH₃CN-H₂O solvent systems. The formation of the sensor-Au³⁺ complex was also established by high-resolution mass spectrometry (HRMS) data of the complex.

Keywords: triazole, furanose, fluorometric, solvent dependent

Procedia PDF Downloads 82
100 Weak Mutually Unbiased Bases versus Mutually Unbiased Bases in Terms of T-Designs

Authors: Mohamed Shalaby, Yasser Kamal, Negm Shawky

Abstract:

Mutually unbiased bases (MUBs) have an important role in the field of quantum computation and information. A complete set of these bases can be constructed when the system dimension is the power of the prime. Constructing such complete set in composite dimensions is still an open problem. Recently, the concept of weak mutually unbiased bases (WMUBs) in composite dimensions was introduced. A complete set of such bases can be constructed by combining the MUBs in each subsystem. In this paper, we present a comparative study between MUBs and WMUBs in the context of complex projective t-design. Explicit proofs are presented.

Keywords: complex projective t-design, finite quantum systems, mutually unbiased bases, weak mutually unbiased bases

Procedia PDF Downloads 404
99 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations

Authors: Adel Atta Youssef Rezkalla

Abstract:

Russia's invasion of Ukraine tested the international community and prompted not only states but also non-state actors to take deterrent measures in response. In fact, international sports federations, notably FIFA and UEFA, have managed to shift the power dynamic quite effectively by imposing a blanket ban on Russian national teams and clubs. The purpose of this article is to examine the human rights consequences of such actions by international sports organizations. First, the article moves away from assessing the legal status of FIFA and UEFA under international law and examines the question of how a legal connection can be established with their human rights obligations. Secondly, the human rights aspects of the controversial FIFA and UEFA measures against Russian athletes are examined and these are analyzed in more detail using the proportionality test than the principle of non-discrimination under international human rights law. Finally, the main avenues for redress for possible human rights violations related to the actions taken by these organizations are identified and the challenges of arbitration and litigation in Switzerland are highlighted.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 19
98 A Spectrophotometric Method for the Determination of Folic Acid - A Vitamin B9 in Pharmaceutical Dosage Samples

Authors: Chand Pasha, Yasser Turki Alharbi, Krasamira Stancheva

Abstract:

A simple spectrophotometric method for the determination of folic acid in pharmaceutical dosage samples was developed. The method is based on the diazotization reaction of thiourea with sodium nitrite in acidic medium yields diazonium compounds, which is then coupled with folic acid in basic medium yields yellow coloured azo dyes. Beer’s Lamberts law is observed in the range 0.5 – 16.2 μgmL-1 at a maximum wavelength of 416nm. The molar absorbtivity, sandells sensitivity, linear regression equation and detection limit and quantitation limit were found to be 5.695×104 L mol-1cm-1, 7.752×10-3 g cm-2, y= 0.092x - 0.018, 0.687 g mL-1 and 2.083 g mL-1. This method successfully determined Folate in Pharmaceutical formulations.

Keywords: folic acid determination, spectrophotometry, diazotization, thiourea, pharmaceutical dosage samples

Procedia PDF Downloads 32
97 Using Gene Expression Programming in Learning Process of Rough Neural Networks

Authors: Sanaa Rashed Abdallah, Yasser F. Hassan

Abstract:

The paper will introduce an approach where a rough sets, gene expression programming and rough neural networks are used cooperatively for learning and classification support. The Objective of gene expression programming rough neural networks (GEP-RNN) approach is to obtain new classified data with minimum error in training and testing process. Starting point of gene expression programming rough neural networks (GEP-RNN) approach is an information system and the output from this approach is a structure of rough neural networks which is including the weights and thresholds with minimum classification error.

Keywords: rough sets, gene expression programming, rough neural networks, classification

Procedia PDF Downloads 347
96 Combined Localization, Beamforming, and Interference Threshold Estimation in Underlay Cognitive System

Authors: Omar Nasr, Yasser Naguib, Mohamed Hafez

Abstract:

This paper aims at providing an innovative solution for blind interference threshold estimation in an underlay cognitive network to be used in adaptive beamforming by secondary user Transmitter and Receiver. For the task of threshold estimation, blind detection of modulation and SNR are used. For the sake of beamforming several localization algorithms are compared to settle on best one for cognitive environment. Beamforming algorithms as LCMV (Linear Constraint Minimum Variance) and MVDR (Minimum Variance Distortion less) are also proposed and compared. The idea of just nulling the primary user after knowledge of its location is discussed against the idea of working under interference threshold.

Keywords: cognitive radio, underlay, beamforming, MUSIC, MVDR, LCMV, threshold estimation

Procedia PDF Downloads 553
95 Rough Neural Networks in Adapting Cellular Automata Rule for Reducing Image Noise

Authors: Yasser F. Hassan

Abstract:

The reduction or removal of noise in a color image is an essential part of image processing, whether the final information is used for human perception or for an automatic inspection and analysis. This paper describes the modeling system based on the rough neural network model to adaptive cellular automata for various image processing tasks and noise remover. In this paper, we consider the problem of object processing in colored image using rough neural networks to help deriving the rules which will be used in cellular automata for noise image. The proposed method is compared with some classical and recent methods. The results demonstrate that the new model is capable of being trained to perform many different tasks, and that the quality of these results is comparable or better than established specialized algorithms.

Keywords: rough sets, rough neural networks, cellular automata, image processing

Procedia PDF Downloads 397
94 Establishing the Optimum Location of a Single Tower Crane Using a Smart Mathematical Model

Authors: Yasser Abo El-Magd, Wael Fawzy Mohamed

Abstract:

Due to the great development in construction and building field, there are many projects and huge works appeared which consume many construction materials. Accordingly, that causes difficulty in handling traditional transportation means (ordinary cranes) due to their limited capacity; there is an urgent need to use high capacity cranes such as tower cranes. However, with regard to their high expense, we have to take into consideration selecting what type of cranes to be utilized which has been discussed by many researchers. In this research, a proposed technique was created to select the suitable type of crane and the best place for crane erection, in addition to minimum radius for requested crane in order to minimize cost. To fulfill that target, a computer program is designed to numerate these problems, demonstrating an example explaining how to apply program and the result donated the best place.

Keywords: tower crane, jib length, operating time, location, feasible area

Procedia PDF Downloads 189
93 Classification Based on Deep Neural Cellular Automata Model

Authors: Yasser F. Hassan

Abstract:

Deep learning structure is a branch of machine learning science and greet achievement in research and applications. Cellular neural networks are regarded as array of nonlinear analog processors called cells connected in a way allowing parallel computations. The paper discusses how to use deep learning structure for representing neural cellular automata model. The proposed learning technique in cellular automata model will be examined from structure of deep learning. A deep automata neural cellular system modifies each neuron based on the behavior of the individual and its decision as a result of multi-level deep structure learning. The paper will present the architecture of the model and the results of simulation of approach are given. Results from the implementation enrich deep neural cellular automata system and shed a light on concept formulation of the model and the learning in it.

Keywords: cellular automata, neural cellular automata, deep learning, classification

Procedia PDF Downloads 157
92 The Impact of Artificial Intelligence on Spare Parts Technology

Authors: Amir Andria Gad Shehata

Abstract:

Minimizing the inventory cost, optimizing the inventory quantities, and increasing system operational availability are the main motivations to enhance forecasting demand of spare parts in a major power utility company in Medina. This paper reports in an effort made to optimize the orders quantities of spare parts by improving the method of forecasting the demand. The study focuses on equipment that has frequent spare parts purchase orders with uncertain demand. The pattern of the demand considers a lumpy pattern which makes conventional forecasting methods less effective. A comparison was made by benchmarking various methods of forecasting based on experts’ criteria to select the most suitable method for the case study. Three actual data sets were used to make the forecast in this case study. Two neural networks (NN) approaches were utilized and compared, namely long short-term memory (LSTM) and multilayer perceptron (MLP). The results as expected, showed that the NN models gave better results than traditional forecasting method (judgmental method). In addition, the LSTM model had a higher predictive accuracy than the MLP model.

Keywords: spare part, spare part inventory, inventory model, optimization, maintenanceneural network, LSTM, MLP, forecasting demand, inventory management

Procedia PDF Downloads 12
91 Optimal Sizing and Placement of Distributed Generators for Profit Maximization Using Firefly Algorithm

Authors: Engy Adel Mohamed, Yasser Gamal-Eldin Hegazy

Abstract:

This paper presents a firefly based algorithm for optimal sizing and allocation of distributed generators for profit maximization. Distributed generators in the proposed algorithm are of photovoltaic and combined heat and power technologies. Combined heat and power distributed generators are modeled as voltage controlled nodes while photovoltaic distributed generators are modeled as constant power nodes. The proposed algorithm is implemented in MATLAB environment and tested the unbalanced IEEE 37-node feeder. The results show the effectiveness of the proposed algorithm in optimal selection of distributed generators size and site in order to maximize the total system profit.

Keywords: distributed generators, firefly algorithm, IEEE 37-node feeder, profit maximization

Procedia PDF Downloads 407
90 The Effect of Applying Surgical Safety Checklist on Surgical Team’s Knowledge and Performance in Operating Room

Authors: Soheir Weheida, Amal E. Shehata, Samira E. Aboalizm

Abstract:

The aim of this study was to examine the effect of surgical safety checklist on surgical team’s knowledge and performance in operating room. Subjects: A convenience sample 151 (48 head nurse, 45 nurse, 37 surgeon and 21 anesthesiologist) which available in operating room at two different hospitals was included in the study. Setting: The study was carried out at operating room in Menoufia University and Shebin Elkom Teaching Hospitals, Egypt. Tools: I: Surgical safety: Surgical team knowledge assessment structure interview schedule. II: WHO surgical safety observational Checklist. III: Post Surgery Culture Survey scale. Results: There was statistical significant improvement of knowledge mean score and performance about surgical safety especially in post and follow up than pre intervention, before patients entering the operating, before induction of anesthesia, skin incision and post skin closure and before patient leaves operating room, P values (P < 0.001). Improvement of communication post intervention than pre intervention between surgical team’s (4.74 ± 0.540). About two thirds (73.5 %) of studied sample strongly agreed on surgical safety in operating room. Conclusions: Implementation of surgical safety checklist has a positive effect on improving knowledge, performance and communication between surgical teams and these seems to have a positive effect on improve patient safety in the operating room.

Keywords: knowledge, operating room, performance, surgical safety checklist

Procedia PDF Downloads 304
89 The Efficiency of Cytochrome Oxidase Subunit 1 Gene (cox1) in Reconstruction of Phylogenetic Relations among Some Crustacean Species

Authors: Yasser M. Saad, Heba El-Sebaie Abd El-Sadek

Abstract:

Some Metapenaeus monoceros cox1 gene fragments were isolated, purified, sequenced, and comparatively analyzed with some other Crustacean Cox1 gene sequences (obtained from National Center for Biotechnology Information). This work was designed for testing the efficiency of this system in reconstruction of phylogenetic relations among some Crustacean species belonging to four genera (Metapenaeus, Artemia, Daphnia and Calanus). The single nucleotide polymorphism and haplotype diversity were calculated for all estimated mt-DNA fragments. The genetic distance values were 0.292, 0.015, 0.151, and 0.09 within Metapenaeus species, Calanus species, Artemia species, and Daphnia species, respectively. The reconstructed phylogenetic tree is clustered into some unique clades. Cytochrome oxidase subunit 1 gene (cox1) was a powerful system in reconstruction of phylogenetic relations among evaluated crustacean species.

Keywords: crustaceans, genetics, Cox1, phylogeny

Procedia PDF Downloads 327
88 Flexural Behavior of Light-Gauge Steel Box Sections Filled with Normal and Recycled Aggregates Concrete

Authors: Rola El-Nimri, Mu’Tasime Abdel-Jaber, Yasser Hunaiti

Abstract:

The flexural behavior of light-gauge steel box sections filled with recycled concrete was assessed through an experimental program involving 15 composite beams. Recycled concrete was obtained by replacing natural aggregates (NA) with recycled concrete aggregate (RCA) and recycled asphalt pavement (RAP) with replacement levels of 20%, 40%, 60%, 80%, and 100% by the total weight of NA. In addition, RCA and RAP were incorporated in the same mixes with replacement levels of (1) 20% RCA and 80% RAP; (2) 40% RCA and 60% RAP; (3) 60% RCA and 40% RAP; and (4) 80% RCA and 20% RAP. A comparison between the experimental capacities and the theoretically predicted values according to Eurocode 4 (EC4) was made as well. Results proved that the ultimate capacity of composite beams decreased with the increase of recycled aggregate (RA) percentage and EC4 was conservative in predicting the ultimate capacity of composite beams.

Keywords: flexure, light gauge, recycled asphalt pavement, recycled concrete aggregate, steel tube

Procedia PDF Downloads 164
87 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure

Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed

Abstract:

This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.

Keywords: information security management system, information security behaviour, information security governance, information security culture

Procedia PDF Downloads 178